Spotify Starts Shutting Down Its Massive P2P Network

For more than half a decade Spotify has relied on P2P technology to quickly deliver songs to its millions of subscribers. This will be over soon. The music streaming service has started to phase out P2P technology to rely fully on central servers instead.

» via TorrentFreak

Facebook created order out of chaos," Bader said in an interview with us. "But that order was very constricting. It trained us to share in a certain way, to curate our identities, to put forward things we wouldn’t be judged for. … It can be stressful after a while.

Shh, it’s a Secret: The allure of the anonymous internet

The ability to reach everyone I know in one place is no longer a novelty. We don’t want to see daily updates from everyone we meet in perpetuity.

Facebook’s friend problem | The Verge

Ellis Hamburger on why the social network can’t adapt to how we make (and lose) friends

(via thisistheverge)

(via thisistheverge)

It is a golden age for librarians, historians and scholars and it is the sweep of digital tools in the humanities that make it so,” he says. “In the past, if you wanted to study the evolution of language for a PhD or the roles of women in different eras, you had to do all the grunt work with references and citations all done by hand. Now it can be done by machine at an astonishing rate.

How to preserve the web’s past for the future - FT.com

18% of online adults have had important personal information stolen such as their Social Security Number, credit card, or bank account information. That’s an increase from the 11% who reported personal information theft in July 2013.
21% of online adults said they had an email or social networking account compromised or taken over without their permission.The same number reported this experience in a July 2013 survey.

More online Americans say they’ve experienced a personal data breach | Pew Research Center (via onaissues)

(via pewinternet)

The results are a strong indication that merely updating servers to a version of OpenSSL that’s not vulnerable to Heartbleed isn’t enough. Because Heartbleed exploits don’t by default show up in server logs, there’s no way for sites that were vulnerable to rule out the possibility the private certificate key was plucked out of memory by hackers. Anyone possessing the private key can use it to host an impostor site that is virtually impossible for most end users to detect. Anyone visiting the bogus site would see the same https prefix and padlock icon accompanying the site’s authentic server. The demonstration that it’s possible to extract private SSL certificates means that out of an abundance of caution, administrators of sites that used vulnerable versions of OpenSSL should revoke and replace old certificates with new ones as soon as possible. Given the huge number of sites affected, the revelation could create problems.

Private crypto keys are accessible to Heartbleed hackers, new data shows | Ars Technica

Comcast is so concerned about all those other products explicitly because they aren’t just the company that plugs the broadband wire into your home. Comcast is already not only your carrier but also your content — and if they get their way they’ll become your gatekeeper to everyone else’s content, too.

The Comcast Merger Isn’t About Lines On A Map; It’s About Controlling The Delivery Of Information – Consumerist

The Court believes that “legalizing” file-sharing encourages the distribution of counterfeit and pirated works. In addition, it explains that the system poses “an unfair disadvantage to the copyright holders.” The Court further notes that the Dutch system also punishes those who buy their digital movies and music from authorized sources, as they also pay the piracy levy on the devices and media they record them to. “All users are indirectly penalized since they necessarily contribute towards the compensation payable for the harm caused by private reproductions made from an unlawful source. Users consequently find themselves required to bear an additional, non-negligible cost in order to be able to make private copies,” the Court notes.

The Netherlands Must Outlaw Downloading, EU Court Rules (Update) | TorrentFreak

France is not alone. Germany recently banned managers from calling or emailing staff after normal work hours, unless it’s an emergency. “Managers should apply a principle of minimum intervention into workers’ free time and keep the number of people whose spare time is disrupted as low as possible.”

French IT Employees Win Right to Unplug after Work and Other Fascinating News on the Web | TIME.com

The upshot is that entertainment industries have, in the last half-century, gone from simple merchants—buy a ticket in this physical store; buy an album in this physical store—to digital cephalopods, sticking their tentacles into a multitude of diverse businesses and adapting surprisingly quickly to consumer habits as we fall in and out of love with different ways of watching video and listening to music.

The Future of Media Will Be Streamed - Derek Thompson - The Atlantic